Showing 341 - 360 results of 498 for search '"homomorphic encryption"', query time: 0.11s Refine Results
  1. 341

    Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated Learning by Yongjing Zhang, Zhouyang Zhang, Shan Ji, Shenqing Wang, Shitao Huang

    Published 2024-02-01
    “…By combining the functions of the bilinear pairwise accumulator and specific conditional proxy broadcast re-ciphering, the mechanism can verify the integrity of homomorphic encryption keys stored on cloud servers. In addition, the solution enables key management centers to grant secure and controlled access to re-encrypted homomorphic encryption keys to third parties without disclosing the sensitive information contained therein. …”
    Get full text
    Article
  2. 342
  3. 343

    StealthyCRM, a secure Cloud CRM system application that supports fully homomorphic database encryption by Xia, Ye

    Published 2015
    “…To provide a practical and secure solution to these enterprises, this project aims to build a cloud CRM system that enables fully homomorphic encryption. In order to explore the potential of this, the project integrats three key components: Open source CRM system SugarCRM, partial homomorphic database system CryptDB and fully homomorphic encryption library HElib. …”
    Get full text
    Final Year Project (FYP)
  4. 344

    Privacy‐preserving evaluation for support vector clustering by J. Byun, J. Lee, S. Park

    Published 2021-01-01
    “…Abstract The authors proposed a privacy‐preserving evaluation algorithm for support vector clustering with a fully homomorphic encryption. The proposed method assigns clustering labels to encrypted test data with an encrypted support function. …”
    Get full text
    Article
  5. 345

    Fast Proxy Re-Encryption for Publish/Subscribe Systems by Polyakov, Yuriy, Rohloff, Kurt, Sahu, Gyana, Vaikuntanathan, Vinod

    Published 2021
    “…Our first scheme (which we call NTRU-ABD-PRE) is based on a variant of the NTRU-RLWE homomorphic encryption scheme. Our second and main PRE scheme (which we call BV-PRE) is built on top of the Brakerski-Vaikuntanathan (BV) homomorphic encryption scheme and relies solely on the RLWE assumption. …”
    Get full text
    Article
  6. 346

    TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service by Sanyal, A, Kusner, M, Gascon, A, Kanade, V

    Published 2018
    “…The one drawback of using fully homomorphic encryption is the amount of time required to evaluate large machine learning models on encrypted data. …”
    Conference item
  7. 347

    On the IND-CCA1 Security of FHE Schemes by Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum

    Published 2022-03-01
    “…Fully homomorphic encryption (FHE) is a powerful tool in cryptography that allows one to perform arbitrary computations on encrypted material without having to decrypt it first. …”
    Get full text
    Article
  8. 348

    Federify: A Verifiable Federated Learning Scheme Based on zkSNARKs and Blockchain by Ghazaleh Keshavarzkalhori, Cristina Perez-Sola, Guillermo Navarro-Arribas, Jordi Herrera-Joancomarti, Habib Yajam

    Published 2024-01-01
    “…We propose Federify, a decentralized federated learning framework based on blockchain that employs homomorphic encryption and zero knowledge proofs to provide security, privacy, and transparency. …”
    Get full text
    Article
  9. 349

    A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications by Arwa Alromih, Mznah Al-Rodhaan, Yuan Tian

    Published 2018-12-01
    “…The scheme uses homomorphic encryption techniques to conceal the report’s measurement from any adversary. …”
    Get full text
    Article
  10. 350

    Secure Two-Party Decision Tree Classification Based on Function Secret Sharing by Kun Liu, Chunming Tang

    Published 2023-01-01
    “…The critical techniques employed include homomorphic encryption, function secret sharing (FSS), and a custom secure comparison protocol. …”
    Get full text
    Article
  11. 351

    Development of a framework to encrypt plaintext to ciphertext by Zheng, Dongmiao

    Published 2021
    “…The Fully Homomorphic Encryption scheme is an evolvement from the Brakerski- Gentry-Vaikuntanathan (BGV) scheme. …”
    Get full text
    Final Year Project (FYP)
  12. 352

    ПРИМЕНЕНИЕ ЗАПУТЫВАЮЩИХ ПРЕОБРАЗОВАНИЙ В КРИПТОГРАФИИ by Евгений Юрьевич Родионов

    Published 2009-06-01
    “…This paper covers questions related with transforming symmetric encryption schemes into asymmetric and designing homomorphic encryption schemes.…”
    Get full text
    Article
  13. 353

    Research on medical data storage and sharing model based on blockchain by Jian Zhao, Wenqian Qiang, Zisong Zhao, Tianbo An, Zhejun Kuang, Dawei Xu, Lijuan Shi

    Published 2023-09-01
    “…To solve the above problems, a secure storage and sharing model of private data based on blockchain technology and homomorphic encryption is constructed. Based on the idea of blockchain decentralization, the model maintains a reliable medical alliance chain system to ensure the safe transmission of data between different institutions; A privacy data encryption and computing protocol based on homomorphic encryption is constructed to ensure the safe transmission of medical data; Using its complete anonymity to ensure the Blockchain of medical data and patient identity privacy; A strict transaction control management mechanism of medical data based on Intelligent contract automatic execution of preset instructions is proposed. …”
    Get full text
    Article
  14. 354

    Blockchain Based M+1st-Price Auction With Exponential Bid Upper Bound by Po-Chu Hsu, Atsuko Miyaji

    Published 2023-01-01
    “…However, previous protocols that use binary format bidding vectors require a somewhat homomorphic encryption (SHE) and a trusted manager. To make sure no party except the bidder itself knows its bid, our protocol does not have any managers. …”
    Get full text
    Article
  15. 355

    SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers by Khedr, Alhassan, Gulak, Glenn, Vaikuntanathan, Vinod

    Published 2017
    “…Homomorphic encryption (HE) systems enable computations on encrypted data, without decrypting and without knowledge of the secret key. …”
    Get full text
    Get full text
    Article
  16. 356
  17. 357

    Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition With Privacy Protection by Pawel Drozdowski, Fabian Stockhardt, Christian Rathgeb, Daile Osorio-Roig, Christoph Busch

    Published 2021-01-01
    “…Furthermore, by facilitating a seamless integration of template protection with open-source homomorphic encryption libraries, the proposed method guarantees unlinkability, irreversibility, and renewability of the protected biometric data.…”
    Get full text
    Article
  18. 358

    Let’s stride blindfolded in a forest : sublinear multi-client decision trees evaluation by Ma, Jack P. K., Tai, Raymond K. H., Zhao, Yongjun, Chow, Sherman S. M.

    Published 2021
    “…(ESORICS ’17) propose a privacy-preserving decision-tree evaluation protocol purely based on additive homomorphic encryption, without introducing dummy nodes for hiding the tree structure, but it runs a secure comparison for each decision node, resulting in linear complexity. …”
    Get full text
    Conference Paper
  19. 359

    Secure human action recognition by encrypted neural network inference by Miran Kim, Xiaoqian Jiang, Kristin Lauter, Elkhan Ismayilzada, Shayan Shams

    Published 2022-08-01
    “…In this paper, the authors propose a strategy that uses homomorphic encryption, which guarantees information confidentiality while retaining action detection.…”
    Get full text
    Article
  20. 360

    Privacy-preserving protocols from lattice cryptography by Tan, Benjamin Hong Meng

    Published 2019
    “…In the first scenario, we use fully homomorphic encryption for finite extension fields and design a wildcard pattern matching algorithm on encrypted strings and patterns. …”
    Get full text
    Get full text
    Thesis